Permalink
CVE-2026-25529
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Activity log
- Created suggestion
Postal has HTML injection / XSS in message view
Postal is an open source SMTP server. Postal versions less than 3.3.5 had a HTML injection vulnerability that allowed unescaped data to be included in the admin interface. The primary way for unescaped data to be added is via the API's "send/raw" method. This could allow arbitrary HTML to be injected in to the page which may modify the page in a misleading way or allow for unauthorised javascript to be executed. Fixed in 3.3.5 and higher.
References
-
https://github.com/postalserver/postal/security/advisories/GHSA-5f4r-5jpr-rfhc x_refsource_CONFIRM
Affected products
postal
- ==< 3.3.5
Matching in nixpkgs
pkgs.libpostal
C library for parsing/normalizing street addresses around the world. Powered by statistical NLP and open geo data
Package maintainers
-
@Thra11 Tom Hall <tahall256@protonmail.ch>